Vulnerabilities Every Bug Bounty Hunter should Know About – Web For Pentesters

0
50

Hello friends how are you today? So today I will be sharing the list of vulnerabilities that every Bug Bounty and security researcher should learn and should know about.

If you are new to this world of ethical hacking and Bug Bounty hunting then I would greatly recommend you to learn as much as you can the more you will learn there are more chances for you to get more valid reports there is a saying.

The More You Learn, The More You Earn.

So for you to be successful in this field then you will have to read learn as much as you can and the most important thing after learning it to Practice what you have learned here is a really great article which covers how you can set up your own testing lab.

How To Setup Security Testing Lab (Full Virtual Envournment)

and also do check this article.

How to Setup Virtual Penetration Testing Lab for Ethical Hacking

In this particular article, we will be giving overview about the Vulnerabilities that you must know about.

We are using Web For Pentesters Vulnerabilities lab to practice and learn more about them.

Here is the full Course Over View:-

Cross Site Scripting:-

Directory Traversal:-

All examples are covered in this article:-

Web for Pentester Directory Traversal

Sql Injection:-

All examples are covered under this one article:-

Web for Pentester MySQL Injection

Local File Inclusion:-

File Include Vulnerability Web For Pentester

Unrestrected File Upload:-

All examples are covered under this one article:-

Unrestricted File Upload : Web For Pentester

Command Injection:-

All examples are covered under this one article:-

Command Injection Attacks : Web for Pentester

LDAP Injection:-

All examples are covered under this one article:-

LDAP Injection Attacks : Web For Pentester

XML External Entity (XXE) Or XML Injection:-

All examples are covered under this one article:-

XML External Entity (XXE) Or XML Injection – Web For Pentester

 

Thanks for reading